Working with Domained Tool on Kali Linux

Example 1: Uses subdomain w3wiki.org (Sublist3r (+subbrute), enumall, Knock, Amass, and SubFinder)

python3 domained.py -d w3wiki.org

1. In this example, We will be enumerating the subdomains from the above-listed tools. The more subdomains we collect will help us to expand our target scope.

2. In the below Screenshot, We have the list of subdomains collected by the Sublist3r tool.

3. In the below Screenshot, We have the list of subdomains collected by the Subfinder tool.

4. In the below Screenshot, We have the list of subdomains collected by Amass tool.

Example 2: Uses subdomain w3wiki.org, only Amass and SubFinder and notification

python3 domained.py -d w3wiki.org --quick --notify

1. In this example, We will be performing quick enumeration by choosing only 2 tools for the enumeration process. Amass and SubFinder tools are being selected for this demonstration. In the below Screenshot, the domained tool has started the enumeration process by selecting 1st tool (Amass).

2. In the below Screenshot, After the Amass tool Subfinder tool have to enumerate the subdomains.

3. In the below Screenshot, 2 text files are created which contain subdomains of w3wiki.org which are enumerated using the Amass and Subfinder tool.

Domained is an all-in-one framework that consists of almost every tool which is required for Information Gathering and Enumeration. You can use this Suite for Bug Bounty Programs and Penetration Testing Process.



Domained – Multi Tool Subdomain Enumeration Suite on Kali Linux

Information Gathering is the crucial step in the process of penetration testing. The more you collect the information the more it will help you to get a better testing methodology. So for this purpose of Information Gathering, the Domained tool is created. Domained is a framework collection of various subdomain detection tools. Domained is a python language-based tool that uses several subdomain enumeration tools and wordlists to create a unique list of subdomains passed to the EyeWitness tool for reporting with categorized snapshots, server response headers, and signature-based default credentials checking. Several tools are integrated with the Domained tool that covers the enumeration phase, reporting, and wordlists. Domained tools will allow the penetration tester to verify the target against different programs.

Note: Make Sure You have Python Installed on your System, as this is a python-based tool. Click to check the Installation process: Python Installation Steps on Linux

Similar Reads

Included Subdomain Enumeration Tools

Sublist3r enumall Knock Subbrute massdns Recon-ng Amass SubFinder...

Included Reporting and Wordlists:

EyeWitness SecList (DNS Recon List) LevelUp All.txt Subdomain List...

Installation of Domained Tool in Kali Linux

Step 1: Fire up your Kali Linux terminal and move to Desktop using the following command....

Working with Domained Tool on Kali Linux

Example 1: Uses subdomain geeksforgeeks.org (Sublist3r (+subbrute), enumall, Knock, Amass, and SubFinder)...

Contact Us